]> git.proxmox.com Git - mirror_qemu.git/blob - hw/s390x/s390-pci-bus.c
migration/tls: Use qcrypto_tls_creds_check_endpoint()
[mirror_qemu.git] / hw / s390x / s390-pci-bus.c
1 /*
2 * s390 PCI BUS
3 *
4 * Copyright 2014 IBM Corp.
5 * Author(s): Frank Blaschka <frank.blaschka@de.ibm.com>
6 * Hong Bo Li <lihbbj@cn.ibm.com>
7 * Yi Min Zhao <zyimin@cn.ibm.com>
8 *
9 * This work is licensed under the terms of the GNU GPL, version 2 or (at
10 * your option) any later version. See the COPYING file in the top-level
11 * directory.
12 */
13
14 #include "qemu/osdep.h"
15 #include "qapi/error.h"
16 #include "qapi/visitor.h"
17 #include "hw/s390x/s390-pci-bus.h"
18 #include "hw/s390x/s390-pci-inst.h"
19 #include "hw/s390x/s390-pci-vfio.h"
20 #include "hw/pci/pci_bus.h"
21 #include "hw/qdev-properties.h"
22 #include "hw/pci/pci_bridge.h"
23 #include "hw/pci/msi.h"
24 #include "qemu/error-report.h"
25 #include "qemu/module.h"
26
27 #ifndef DEBUG_S390PCI_BUS
28 #define DEBUG_S390PCI_BUS 0
29 #endif
30
31 #define DPRINTF(fmt, ...) \
32 do { \
33 if (DEBUG_S390PCI_BUS) { \
34 fprintf(stderr, "S390pci-bus: " fmt, ## __VA_ARGS__); \
35 } \
36 } while (0)
37
38 S390pciState *s390_get_phb(void)
39 {
40 static S390pciState *phb;
41
42 if (!phb) {
43 phb = S390_PCI_HOST_BRIDGE(
44 object_resolve_path(TYPE_S390_PCI_HOST_BRIDGE, NULL));
45 assert(phb != NULL);
46 }
47
48 return phb;
49 }
50
51 int pci_chsc_sei_nt2_get_event(void *res)
52 {
53 ChscSeiNt2Res *nt2_res = (ChscSeiNt2Res *)res;
54 PciCcdfAvail *accdf;
55 PciCcdfErr *eccdf;
56 int rc = 1;
57 SeiContainer *sei_cont;
58 S390pciState *s = s390_get_phb();
59
60 sei_cont = QTAILQ_FIRST(&s->pending_sei);
61 if (sei_cont) {
62 QTAILQ_REMOVE(&s->pending_sei, sei_cont, link);
63 nt2_res->nt = 2;
64 nt2_res->cc = sei_cont->cc;
65 nt2_res->length = cpu_to_be16(sizeof(ChscSeiNt2Res));
66 switch (sei_cont->cc) {
67 case 1: /* error event */
68 eccdf = (PciCcdfErr *)nt2_res->ccdf;
69 eccdf->fid = cpu_to_be32(sei_cont->fid);
70 eccdf->fh = cpu_to_be32(sei_cont->fh);
71 eccdf->e = cpu_to_be32(sei_cont->e);
72 eccdf->faddr = cpu_to_be64(sei_cont->faddr);
73 eccdf->pec = cpu_to_be16(sei_cont->pec);
74 break;
75 case 2: /* availability event */
76 accdf = (PciCcdfAvail *)nt2_res->ccdf;
77 accdf->fid = cpu_to_be32(sei_cont->fid);
78 accdf->fh = cpu_to_be32(sei_cont->fh);
79 accdf->pec = cpu_to_be16(sei_cont->pec);
80 break;
81 default:
82 abort();
83 }
84 g_free(sei_cont);
85 rc = 0;
86 }
87
88 return rc;
89 }
90
91 int pci_chsc_sei_nt2_have_event(void)
92 {
93 S390pciState *s = s390_get_phb();
94
95 return !QTAILQ_EMPTY(&s->pending_sei);
96 }
97
98 S390PCIBusDevice *s390_pci_find_next_avail_dev(S390pciState *s,
99 S390PCIBusDevice *pbdev)
100 {
101 S390PCIBusDevice *ret = pbdev ? QTAILQ_NEXT(pbdev, link) :
102 QTAILQ_FIRST(&s->zpci_devs);
103
104 while (ret && ret->state == ZPCI_FS_RESERVED) {
105 ret = QTAILQ_NEXT(ret, link);
106 }
107
108 return ret;
109 }
110
111 S390PCIBusDevice *s390_pci_find_dev_by_fid(S390pciState *s, uint32_t fid)
112 {
113 S390PCIBusDevice *pbdev;
114
115 QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
116 if (pbdev->fid == fid) {
117 return pbdev;
118 }
119 }
120
121 return NULL;
122 }
123
124 void s390_pci_sclp_configure(SCCB *sccb)
125 {
126 IoaCfgSccb *psccb = (IoaCfgSccb *)sccb;
127 S390PCIBusDevice *pbdev = s390_pci_find_dev_by_fid(s390_get_phb(),
128 be32_to_cpu(psccb->aid));
129 uint16_t rc;
130
131 if (!pbdev) {
132 DPRINTF("sclp config no dev found\n");
133 rc = SCLP_RC_ADAPTER_ID_NOT_RECOGNIZED;
134 goto out;
135 }
136
137 switch (pbdev->state) {
138 case ZPCI_FS_RESERVED:
139 rc = SCLP_RC_ADAPTER_IN_RESERVED_STATE;
140 break;
141 case ZPCI_FS_STANDBY:
142 pbdev->state = ZPCI_FS_DISABLED;
143 rc = SCLP_RC_NORMAL_COMPLETION;
144 break;
145 default:
146 rc = SCLP_RC_NO_ACTION_REQUIRED;
147 }
148 out:
149 psccb->header.response_code = cpu_to_be16(rc);
150 }
151
152 static void s390_pci_perform_unplug(S390PCIBusDevice *pbdev)
153 {
154 HotplugHandler *hotplug_ctrl;
155
156 /* Unplug the PCI device */
157 if (pbdev->pdev) {
158 DeviceState *pdev = DEVICE(pbdev->pdev);
159
160 hotplug_ctrl = qdev_get_hotplug_handler(pdev);
161 hotplug_handler_unplug(hotplug_ctrl, pdev, &error_abort);
162 object_unparent(OBJECT(pdev));
163 }
164
165 /* Unplug the zPCI device */
166 hotplug_ctrl = qdev_get_hotplug_handler(DEVICE(pbdev));
167 hotplug_handler_unplug(hotplug_ctrl, DEVICE(pbdev), &error_abort);
168 object_unparent(OBJECT(pbdev));
169 }
170
171 void s390_pci_sclp_deconfigure(SCCB *sccb)
172 {
173 IoaCfgSccb *psccb = (IoaCfgSccb *)sccb;
174 S390PCIBusDevice *pbdev = s390_pci_find_dev_by_fid(s390_get_phb(),
175 be32_to_cpu(psccb->aid));
176 uint16_t rc;
177
178 if (!pbdev) {
179 DPRINTF("sclp deconfig no dev found\n");
180 rc = SCLP_RC_ADAPTER_ID_NOT_RECOGNIZED;
181 goto out;
182 }
183
184 switch (pbdev->state) {
185 case ZPCI_FS_RESERVED:
186 rc = SCLP_RC_ADAPTER_IN_RESERVED_STATE;
187 break;
188 case ZPCI_FS_STANDBY:
189 rc = SCLP_RC_NO_ACTION_REQUIRED;
190 break;
191 default:
192 if (pbdev->summary_ind) {
193 pci_dereg_irqs(pbdev);
194 }
195 if (pbdev->iommu->enabled) {
196 pci_dereg_ioat(pbdev->iommu);
197 }
198 pbdev->state = ZPCI_FS_STANDBY;
199 rc = SCLP_RC_NORMAL_COMPLETION;
200
201 if (pbdev->unplug_requested) {
202 s390_pci_perform_unplug(pbdev);
203 }
204 }
205 out:
206 psccb->header.response_code = cpu_to_be16(rc);
207 }
208
209 static S390PCIBusDevice *s390_pci_find_dev_by_uid(S390pciState *s, uint16_t uid)
210 {
211 S390PCIBusDevice *pbdev;
212
213 QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
214 if (pbdev->uid == uid) {
215 return pbdev;
216 }
217 }
218
219 return NULL;
220 }
221
222 S390PCIBusDevice *s390_pci_find_dev_by_target(S390pciState *s,
223 const char *target)
224 {
225 S390PCIBusDevice *pbdev;
226
227 if (!target) {
228 return NULL;
229 }
230
231 QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
232 if (!strcmp(pbdev->target, target)) {
233 return pbdev;
234 }
235 }
236
237 return NULL;
238 }
239
240 static S390PCIBusDevice *s390_pci_find_dev_by_pci(S390pciState *s,
241 PCIDevice *pci_dev)
242 {
243 S390PCIBusDevice *pbdev;
244
245 if (!pci_dev) {
246 return NULL;
247 }
248
249 QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
250 if (pbdev->pdev == pci_dev) {
251 return pbdev;
252 }
253 }
254
255 return NULL;
256 }
257
258 S390PCIBusDevice *s390_pci_find_dev_by_idx(S390pciState *s, uint32_t idx)
259 {
260 return g_hash_table_lookup(s->zpci_table, &idx);
261 }
262
263 S390PCIBusDevice *s390_pci_find_dev_by_fh(S390pciState *s, uint32_t fh)
264 {
265 uint32_t idx = FH_MASK_INDEX & fh;
266 S390PCIBusDevice *pbdev = s390_pci_find_dev_by_idx(s, idx);
267
268 if (pbdev && pbdev->fh == fh) {
269 return pbdev;
270 }
271
272 return NULL;
273 }
274
275 static void s390_pci_generate_event(uint8_t cc, uint16_t pec, uint32_t fh,
276 uint32_t fid, uint64_t faddr, uint32_t e)
277 {
278 SeiContainer *sei_cont;
279 S390pciState *s = s390_get_phb();
280
281 sei_cont = g_new0(SeiContainer, 1);
282 sei_cont->fh = fh;
283 sei_cont->fid = fid;
284 sei_cont->cc = cc;
285 sei_cont->pec = pec;
286 sei_cont->faddr = faddr;
287 sei_cont->e = e;
288
289 QTAILQ_INSERT_TAIL(&s->pending_sei, sei_cont, link);
290 css_generate_css_crws(0);
291 }
292
293 static void s390_pci_generate_plug_event(uint16_t pec, uint32_t fh,
294 uint32_t fid)
295 {
296 s390_pci_generate_event(2, pec, fh, fid, 0, 0);
297 }
298
299 void s390_pci_generate_error_event(uint16_t pec, uint32_t fh, uint32_t fid,
300 uint64_t faddr, uint32_t e)
301 {
302 s390_pci_generate_event(1, pec, fh, fid, faddr, e);
303 }
304
305 static void s390_pci_set_irq(void *opaque, int irq, int level)
306 {
307 /* nothing to do */
308 }
309
310 static int s390_pci_map_irq(PCIDevice *pci_dev, int irq_num)
311 {
312 /* nothing to do */
313 return 0;
314 }
315
316 static uint64_t s390_pci_get_table_origin(uint64_t iota)
317 {
318 return iota & ~ZPCI_IOTA_RTTO_FLAG;
319 }
320
321 static unsigned int calc_rtx(dma_addr_t ptr)
322 {
323 return ((unsigned long) ptr >> ZPCI_RT_SHIFT) & ZPCI_INDEX_MASK;
324 }
325
326 static unsigned int calc_sx(dma_addr_t ptr)
327 {
328 return ((unsigned long) ptr >> ZPCI_ST_SHIFT) & ZPCI_INDEX_MASK;
329 }
330
331 static unsigned int calc_px(dma_addr_t ptr)
332 {
333 return ((unsigned long) ptr >> PAGE_SHIFT) & ZPCI_PT_MASK;
334 }
335
336 static uint64_t get_rt_sto(uint64_t entry)
337 {
338 return ((entry & ZPCI_TABLE_TYPE_MASK) == ZPCI_TABLE_TYPE_RTX)
339 ? (entry & ZPCI_RTE_ADDR_MASK)
340 : 0;
341 }
342
343 static uint64_t get_st_pto(uint64_t entry)
344 {
345 return ((entry & ZPCI_TABLE_TYPE_MASK) == ZPCI_TABLE_TYPE_SX)
346 ? (entry & ZPCI_STE_ADDR_MASK)
347 : 0;
348 }
349
350 static bool rt_entry_isvalid(uint64_t entry)
351 {
352 return (entry & ZPCI_TABLE_VALID_MASK) == ZPCI_TABLE_VALID;
353 }
354
355 static bool pt_entry_isvalid(uint64_t entry)
356 {
357 return (entry & ZPCI_PTE_VALID_MASK) == ZPCI_PTE_VALID;
358 }
359
360 static bool entry_isprotected(uint64_t entry)
361 {
362 return (entry & ZPCI_TABLE_PROT_MASK) == ZPCI_TABLE_PROTECTED;
363 }
364
365 /* ett is expected table type, -1 page table, 0 segment table, 1 region table */
366 static uint64_t get_table_index(uint64_t iova, int8_t ett)
367 {
368 switch (ett) {
369 case ZPCI_ETT_PT:
370 return calc_px(iova);
371 case ZPCI_ETT_ST:
372 return calc_sx(iova);
373 case ZPCI_ETT_RT:
374 return calc_rtx(iova);
375 }
376
377 return -1;
378 }
379
380 static bool entry_isvalid(uint64_t entry, int8_t ett)
381 {
382 switch (ett) {
383 case ZPCI_ETT_PT:
384 return pt_entry_isvalid(entry);
385 case ZPCI_ETT_ST:
386 case ZPCI_ETT_RT:
387 return rt_entry_isvalid(entry);
388 }
389
390 return false;
391 }
392
393 /* Return true if address translation is done */
394 static bool translate_iscomplete(uint64_t entry, int8_t ett)
395 {
396 switch (ett) {
397 case 0:
398 return (entry & ZPCI_TABLE_FC) ? true : false;
399 case 1:
400 return false;
401 }
402
403 return true;
404 }
405
406 static uint64_t get_frame_size(int8_t ett)
407 {
408 switch (ett) {
409 case ZPCI_ETT_PT:
410 return 1ULL << 12;
411 case ZPCI_ETT_ST:
412 return 1ULL << 20;
413 case ZPCI_ETT_RT:
414 return 1ULL << 31;
415 }
416
417 return 0;
418 }
419
420 static uint64_t get_next_table_origin(uint64_t entry, int8_t ett)
421 {
422 switch (ett) {
423 case ZPCI_ETT_PT:
424 return entry & ZPCI_PTE_ADDR_MASK;
425 case ZPCI_ETT_ST:
426 return get_st_pto(entry);
427 case ZPCI_ETT_RT:
428 return get_rt_sto(entry);
429 }
430
431 return 0;
432 }
433
434 /**
435 * table_translate: do translation within one table and return the following
436 * table origin
437 *
438 * @entry: the entry being translated, the result is stored in this.
439 * @to: the address of table origin.
440 * @ett: expected table type, 1 region table, 0 segment table and -1 page table.
441 * @error: error code
442 */
443 static uint64_t table_translate(S390IOTLBEntry *entry, uint64_t to, int8_t ett,
444 uint16_t *error)
445 {
446 uint64_t tx, te, nto = 0;
447 uint16_t err = 0;
448
449 tx = get_table_index(entry->iova, ett);
450 te = address_space_ldq(&address_space_memory, to + tx * sizeof(uint64_t),
451 MEMTXATTRS_UNSPECIFIED, NULL);
452
453 if (!te) {
454 err = ERR_EVENT_INVALTE;
455 goto out;
456 }
457
458 if (!entry_isvalid(te, ett)) {
459 entry->perm &= IOMMU_NONE;
460 goto out;
461 }
462
463 if (ett == ZPCI_ETT_RT && ((te & ZPCI_TABLE_LEN_RTX) != ZPCI_TABLE_LEN_RTX
464 || te & ZPCI_TABLE_OFFSET_MASK)) {
465 err = ERR_EVENT_INVALTL;
466 goto out;
467 }
468
469 nto = get_next_table_origin(te, ett);
470 if (!nto) {
471 err = ERR_EVENT_TT;
472 goto out;
473 }
474
475 if (entry_isprotected(te)) {
476 entry->perm &= IOMMU_RO;
477 } else {
478 entry->perm &= IOMMU_RW;
479 }
480
481 if (translate_iscomplete(te, ett)) {
482 switch (ett) {
483 case ZPCI_ETT_PT:
484 entry->translated_addr = te & ZPCI_PTE_ADDR_MASK;
485 break;
486 case ZPCI_ETT_ST:
487 entry->translated_addr = (te & ZPCI_SFAA_MASK) |
488 (entry->iova & ~ZPCI_SFAA_MASK);
489 break;
490 }
491 nto = 0;
492 }
493 out:
494 if (err) {
495 entry->perm = IOMMU_NONE;
496 *error = err;
497 }
498 entry->len = get_frame_size(ett);
499 return nto;
500 }
501
502 uint16_t s390_guest_io_table_walk(uint64_t g_iota, hwaddr addr,
503 S390IOTLBEntry *entry)
504 {
505 uint64_t to = s390_pci_get_table_origin(g_iota);
506 int8_t ett = 1;
507 uint16_t error = 0;
508
509 entry->iova = addr & PAGE_MASK;
510 entry->translated_addr = 0;
511 entry->perm = IOMMU_RW;
512
513 if (entry_isprotected(g_iota)) {
514 entry->perm &= IOMMU_RO;
515 }
516
517 while (to) {
518 to = table_translate(entry, to, ett--, &error);
519 }
520
521 return error;
522 }
523
524 static IOMMUTLBEntry s390_translate_iommu(IOMMUMemoryRegion *mr, hwaddr addr,
525 IOMMUAccessFlags flag, int iommu_idx)
526 {
527 S390PCIIOMMU *iommu = container_of(mr, S390PCIIOMMU, iommu_mr);
528 S390IOTLBEntry *entry;
529 uint64_t iova = addr & PAGE_MASK;
530 uint16_t error = 0;
531 IOMMUTLBEntry ret = {
532 .target_as = &address_space_memory,
533 .iova = 0,
534 .translated_addr = 0,
535 .addr_mask = ~(hwaddr)0,
536 .perm = IOMMU_NONE,
537 };
538
539 switch (iommu->pbdev->state) {
540 case ZPCI_FS_ENABLED:
541 case ZPCI_FS_BLOCKED:
542 if (!iommu->enabled) {
543 return ret;
544 }
545 break;
546 default:
547 return ret;
548 }
549
550 DPRINTF("iommu trans addr 0x%" PRIx64 "\n", addr);
551
552 if (addr < iommu->pba || addr > iommu->pal) {
553 error = ERR_EVENT_OORANGE;
554 goto err;
555 }
556
557 entry = g_hash_table_lookup(iommu->iotlb, &iova);
558 if (entry) {
559 ret.iova = entry->iova;
560 ret.translated_addr = entry->translated_addr;
561 ret.addr_mask = entry->len - 1;
562 ret.perm = entry->perm;
563 } else {
564 ret.iova = iova;
565 ret.addr_mask = ~PAGE_MASK;
566 ret.perm = IOMMU_NONE;
567 }
568
569 if (flag != IOMMU_NONE && !(flag & ret.perm)) {
570 error = ERR_EVENT_TPROTE;
571 }
572 err:
573 if (error) {
574 iommu->pbdev->state = ZPCI_FS_ERROR;
575 s390_pci_generate_error_event(error, iommu->pbdev->fh,
576 iommu->pbdev->fid, addr, 0);
577 }
578 return ret;
579 }
580
581 static void s390_pci_iommu_replay(IOMMUMemoryRegion *iommu,
582 IOMMUNotifier *notifier)
583 {
584 /* It's impossible to plug a pci device on s390x that already has iommu
585 * mappings which need to be replayed, that is due to the "one iommu per
586 * zpci device" construct. But when we support migration of vfio-pci
587 * devices in future, we need to revisit this.
588 */
589 return;
590 }
591
592 static S390PCIIOMMU *s390_pci_get_iommu(S390pciState *s, PCIBus *bus,
593 int devfn)
594 {
595 uint64_t key = (uintptr_t)bus;
596 S390PCIIOMMUTable *table = g_hash_table_lookup(s->iommu_table, &key);
597 S390PCIIOMMU *iommu;
598
599 if (!table) {
600 table = g_new0(S390PCIIOMMUTable, 1);
601 table->key = key;
602 g_hash_table_insert(s->iommu_table, &table->key, table);
603 }
604
605 iommu = table->iommu[PCI_SLOT(devfn)];
606 if (!iommu) {
607 iommu = S390_PCI_IOMMU(object_new(TYPE_S390_PCI_IOMMU));
608
609 char *mr_name = g_strdup_printf("iommu-root-%02x:%02x.%01x",
610 pci_bus_num(bus),
611 PCI_SLOT(devfn),
612 PCI_FUNC(devfn));
613 char *as_name = g_strdup_printf("iommu-pci-%02x:%02x.%01x",
614 pci_bus_num(bus),
615 PCI_SLOT(devfn),
616 PCI_FUNC(devfn));
617 memory_region_init(&iommu->mr, OBJECT(iommu), mr_name, UINT64_MAX);
618 address_space_init(&iommu->as, &iommu->mr, as_name);
619 iommu->iotlb = g_hash_table_new_full(g_int64_hash, g_int64_equal,
620 NULL, g_free);
621 table->iommu[PCI_SLOT(devfn)] = iommu;
622
623 g_free(mr_name);
624 g_free(as_name);
625 }
626
627 return iommu;
628 }
629
630 static AddressSpace *s390_pci_dma_iommu(PCIBus *bus, void *opaque, int devfn)
631 {
632 S390pciState *s = opaque;
633 S390PCIIOMMU *iommu = s390_pci_get_iommu(s, bus, devfn);
634
635 return &iommu->as;
636 }
637
638 static uint8_t set_ind_atomic(uint64_t ind_loc, uint8_t to_be_set)
639 {
640 uint8_t expected, actual;
641 hwaddr len = 1;
642 /* avoid multiple fetches */
643 uint8_t volatile *ind_addr;
644
645 ind_addr = cpu_physical_memory_map(ind_loc, &len, true);
646 if (!ind_addr) {
647 s390_pci_generate_error_event(ERR_EVENT_AIRERR, 0, 0, 0, 0);
648 return -1;
649 }
650 actual = *ind_addr;
651 do {
652 expected = actual;
653 actual = qatomic_cmpxchg(ind_addr, expected, expected | to_be_set);
654 } while (actual != expected);
655 cpu_physical_memory_unmap((void *)ind_addr, len, 1, len);
656
657 return actual;
658 }
659
660 static void s390_msi_ctrl_write(void *opaque, hwaddr addr, uint64_t data,
661 unsigned int size)
662 {
663 S390PCIBusDevice *pbdev = opaque;
664 uint32_t vec = data & ZPCI_MSI_VEC_MASK;
665 uint64_t ind_bit;
666 uint32_t sum_bit;
667
668 assert(pbdev);
669 DPRINTF("write_msix data 0x%" PRIx64 " idx %d vec 0x%x\n", data,
670 pbdev->idx, vec);
671
672 if (pbdev->state != ZPCI_FS_ENABLED) {
673 return;
674 }
675
676 ind_bit = pbdev->routes.adapter.ind_offset;
677 sum_bit = pbdev->routes.adapter.summary_offset;
678
679 set_ind_atomic(pbdev->routes.adapter.ind_addr + (ind_bit + vec) / 8,
680 0x80 >> ((ind_bit + vec) % 8));
681 if (!set_ind_atomic(pbdev->routes.adapter.summary_addr + sum_bit / 8,
682 0x80 >> (sum_bit % 8))) {
683 css_adapter_interrupt(CSS_IO_ADAPTER_PCI, pbdev->isc);
684 }
685 }
686
687 static uint64_t s390_msi_ctrl_read(void *opaque, hwaddr addr, unsigned size)
688 {
689 return 0xffffffff;
690 }
691
692 static const MemoryRegionOps s390_msi_ctrl_ops = {
693 .write = s390_msi_ctrl_write,
694 .read = s390_msi_ctrl_read,
695 .endianness = DEVICE_LITTLE_ENDIAN,
696 };
697
698 void s390_pci_iommu_enable(S390PCIIOMMU *iommu)
699 {
700 /*
701 * The iommu region is initialized against a 0-mapped address space,
702 * so the smallest IOMMU region we can define runs from 0 to the end
703 * of the PCI address space.
704 */
705 char *name = g_strdup_printf("iommu-s390-%04x", iommu->pbdev->uid);
706 memory_region_init_iommu(&iommu->iommu_mr, sizeof(iommu->iommu_mr),
707 TYPE_S390_IOMMU_MEMORY_REGION, OBJECT(&iommu->mr),
708 name, iommu->pal + 1);
709 iommu->enabled = true;
710 memory_region_add_subregion(&iommu->mr, 0, MEMORY_REGION(&iommu->iommu_mr));
711 g_free(name);
712 }
713
714 void s390_pci_iommu_disable(S390PCIIOMMU *iommu)
715 {
716 iommu->enabled = false;
717 g_hash_table_remove_all(iommu->iotlb);
718 memory_region_del_subregion(&iommu->mr, MEMORY_REGION(&iommu->iommu_mr));
719 object_unparent(OBJECT(&iommu->iommu_mr));
720 }
721
722 static void s390_pci_iommu_free(S390pciState *s, PCIBus *bus, int32_t devfn)
723 {
724 uint64_t key = (uintptr_t)bus;
725 S390PCIIOMMUTable *table = g_hash_table_lookup(s->iommu_table, &key);
726 S390PCIIOMMU *iommu = table ? table->iommu[PCI_SLOT(devfn)] : NULL;
727
728 if (!table || !iommu) {
729 return;
730 }
731
732 table->iommu[PCI_SLOT(devfn)] = NULL;
733 g_hash_table_destroy(iommu->iotlb);
734 /*
735 * An attached PCI device may have memory listeners, eg. VFIO PCI.
736 * The associated subregion will already have been unmapped in
737 * s390_pci_iommu_disable in response to the guest deconfigure request.
738 * Remove the listeners now before destroying the address space.
739 */
740 address_space_remove_listeners(&iommu->as);
741 address_space_destroy(&iommu->as);
742 object_unparent(OBJECT(&iommu->mr));
743 object_unparent(OBJECT(iommu));
744 object_unref(OBJECT(iommu));
745 }
746
747 S390PCIGroup *s390_group_create(int id)
748 {
749 S390PCIGroup *group;
750 S390pciState *s = s390_get_phb();
751
752 group = g_new0(S390PCIGroup, 1);
753 group->id = id;
754 QTAILQ_INSERT_TAIL(&s->zpci_groups, group, link);
755 return group;
756 }
757
758 S390PCIGroup *s390_group_find(int id)
759 {
760 S390PCIGroup *group;
761 S390pciState *s = s390_get_phb();
762
763 QTAILQ_FOREACH(group, &s->zpci_groups, link) {
764 if (group->id == id) {
765 return group;
766 }
767 }
768 return NULL;
769 }
770
771 static void s390_pci_init_default_group(void)
772 {
773 S390PCIGroup *group;
774 ClpRspQueryPciGrp *resgrp;
775
776 group = s390_group_create(ZPCI_DEFAULT_FN_GRP);
777 resgrp = &group->zpci_group;
778 resgrp->fr = 1;
779 resgrp->dasm = 0;
780 resgrp->msia = ZPCI_MSI_ADDR;
781 resgrp->mui = DEFAULT_MUI;
782 resgrp->i = 128;
783 resgrp->maxstbl = 128;
784 resgrp->version = 0;
785 }
786
787 static void set_pbdev_info(S390PCIBusDevice *pbdev)
788 {
789 pbdev->zpci_fn.sdma = ZPCI_SDMA_ADDR;
790 pbdev->zpci_fn.edma = ZPCI_EDMA_ADDR;
791 pbdev->zpci_fn.pchid = 0;
792 pbdev->zpci_fn.pfgid = ZPCI_DEFAULT_FN_GRP;
793 pbdev->zpci_fn.fid = pbdev->fid;
794 pbdev->zpci_fn.uid = pbdev->uid;
795 pbdev->pci_group = s390_group_find(ZPCI_DEFAULT_FN_GRP);
796 }
797
798 static void s390_pcihost_realize(DeviceState *dev, Error **errp)
799 {
800 PCIBus *b;
801 BusState *bus;
802 PCIHostState *phb = PCI_HOST_BRIDGE(dev);
803 S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
804
805 DPRINTF("host_init\n");
806
807 b = pci_register_root_bus(dev, NULL, s390_pci_set_irq, s390_pci_map_irq,
808 NULL, get_system_memory(), get_system_io(), 0,
809 64, TYPE_PCI_BUS);
810 pci_setup_iommu(b, s390_pci_dma_iommu, s);
811
812 bus = BUS(b);
813 qbus_set_hotplug_handler(bus, OBJECT(dev));
814 phb->bus = b;
815
816 s->bus = S390_PCI_BUS(qbus_create(TYPE_S390_PCI_BUS, dev, NULL));
817 qbus_set_hotplug_handler(BUS(s->bus), OBJECT(dev));
818
819 s->iommu_table = g_hash_table_new_full(g_int64_hash, g_int64_equal,
820 NULL, g_free);
821 s->zpci_table = g_hash_table_new_full(g_int_hash, g_int_equal, NULL, NULL);
822 s->bus_no = 0;
823 QTAILQ_INIT(&s->pending_sei);
824 QTAILQ_INIT(&s->zpci_devs);
825 QTAILQ_INIT(&s->zpci_dma_limit);
826 QTAILQ_INIT(&s->zpci_groups);
827
828 s390_pci_init_default_group();
829 css_register_io_adapters(CSS_IO_ADAPTER_PCI, true, false,
830 S390_ADAPTER_SUPPRESSIBLE, errp);
831 }
832
833 static void s390_pcihost_unrealize(DeviceState *dev)
834 {
835 S390PCIGroup *group;
836 S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
837
838 while (!QTAILQ_EMPTY(&s->zpci_groups)) {
839 group = QTAILQ_FIRST(&s->zpci_groups);
840 QTAILQ_REMOVE(&s->zpci_groups, group, link);
841 }
842 }
843
844 static int s390_pci_msix_init(S390PCIBusDevice *pbdev)
845 {
846 char *name;
847 uint8_t pos;
848 uint16_t ctrl;
849 uint32_t table, pba;
850
851 pos = pci_find_capability(pbdev->pdev, PCI_CAP_ID_MSIX);
852 if (!pos) {
853 return -1;
854 }
855
856 ctrl = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_FLAGS,
857 pci_config_size(pbdev->pdev), sizeof(ctrl));
858 table = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_TABLE,
859 pci_config_size(pbdev->pdev), sizeof(table));
860 pba = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_PBA,
861 pci_config_size(pbdev->pdev), sizeof(pba));
862
863 pbdev->msix.table_bar = table & PCI_MSIX_FLAGS_BIRMASK;
864 pbdev->msix.table_offset = table & ~PCI_MSIX_FLAGS_BIRMASK;
865 pbdev->msix.pba_bar = pba & PCI_MSIX_FLAGS_BIRMASK;
866 pbdev->msix.pba_offset = pba & ~PCI_MSIX_FLAGS_BIRMASK;
867 pbdev->msix.entries = (ctrl & PCI_MSIX_FLAGS_QSIZE) + 1;
868
869 name = g_strdup_printf("msix-s390-%04x", pbdev->uid);
870 memory_region_init_io(&pbdev->msix_notify_mr, OBJECT(pbdev),
871 &s390_msi_ctrl_ops, pbdev, name, PAGE_SIZE);
872 memory_region_add_subregion(&pbdev->iommu->mr,
873 pbdev->pci_group->zpci_group.msia,
874 &pbdev->msix_notify_mr);
875 g_free(name);
876
877 return 0;
878 }
879
880 static void s390_pci_msix_free(S390PCIBusDevice *pbdev)
881 {
882 memory_region_del_subregion(&pbdev->iommu->mr, &pbdev->msix_notify_mr);
883 object_unparent(OBJECT(&pbdev->msix_notify_mr));
884 }
885
886 static S390PCIBusDevice *s390_pci_device_new(S390pciState *s,
887 const char *target, Error **errp)
888 {
889 Error *local_err = NULL;
890 DeviceState *dev;
891
892 dev = qdev_try_new(TYPE_S390_PCI_DEVICE);
893 if (!dev) {
894 error_setg(errp, "zPCI device could not be created");
895 return NULL;
896 }
897
898 if (!object_property_set_str(OBJECT(dev), "target", target, &local_err)) {
899 object_unparent(OBJECT(dev));
900 error_propagate_prepend(errp, local_err,
901 "zPCI device could not be created: ");
902 return NULL;
903 }
904 if (!qdev_realize_and_unref(dev, BUS(s->bus), &local_err)) {
905 object_unparent(OBJECT(dev));
906 error_propagate_prepend(errp, local_err,
907 "zPCI device could not be created: ");
908 return NULL;
909 }
910
911 return S390_PCI_DEVICE(dev);
912 }
913
914 static bool s390_pci_alloc_idx(S390pciState *s, S390PCIBusDevice *pbdev)
915 {
916 uint32_t idx;
917
918 idx = s->next_idx;
919 while (s390_pci_find_dev_by_idx(s, idx)) {
920 idx = (idx + 1) & FH_MASK_INDEX;
921 if (idx == s->next_idx) {
922 return false;
923 }
924 }
925
926 pbdev->idx = idx;
927 return true;
928 }
929
930 static void s390_pcihost_pre_plug(HotplugHandler *hotplug_dev, DeviceState *dev,
931 Error **errp)
932 {
933 S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
934
935 if (!s390_has_feat(S390_FEAT_ZPCI)) {
936 warn_report("Plugging a PCI/zPCI device without the 'zpci' CPU "
937 "feature enabled; the guest will not be able to see/use "
938 "this device");
939 }
940
941 if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
942 PCIDevice *pdev = PCI_DEVICE(dev);
943
944 if (pdev->cap_present & QEMU_PCI_CAP_MULTIFUNCTION) {
945 error_setg(errp, "multifunction not supported in s390");
946 return;
947 }
948 } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
949 S390PCIBusDevice *pbdev = S390_PCI_DEVICE(dev);
950
951 if (!s390_pci_alloc_idx(s, pbdev)) {
952 error_setg(errp, "no slot for plugging zpci device");
953 return;
954 }
955 }
956 }
957
958 static void s390_pci_update_subordinate(PCIDevice *dev, uint32_t nr)
959 {
960 uint32_t old_nr;
961
962 pci_default_write_config(dev, PCI_SUBORDINATE_BUS, nr, 1);
963 while (!pci_bus_is_root(pci_get_bus(dev))) {
964 dev = pci_get_bus(dev)->parent_dev;
965
966 old_nr = pci_default_read_config(dev, PCI_SUBORDINATE_BUS, 1);
967 if (old_nr < nr) {
968 pci_default_write_config(dev, PCI_SUBORDINATE_BUS, nr, 1);
969 }
970 }
971 }
972
973 static void s390_pcihost_plug(HotplugHandler *hotplug_dev, DeviceState *dev,
974 Error **errp)
975 {
976 S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
977 PCIDevice *pdev = NULL;
978 S390PCIBusDevice *pbdev = NULL;
979
980 if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_BRIDGE)) {
981 PCIBridge *pb = PCI_BRIDGE(dev);
982
983 pdev = PCI_DEVICE(dev);
984 pci_bridge_map_irq(pb, dev->id, s390_pci_map_irq);
985 pci_setup_iommu(&pb->sec_bus, s390_pci_dma_iommu, s);
986
987 qbus_set_hotplug_handler(BUS(&pb->sec_bus), OBJECT(s));
988
989 if (dev->hotplugged) {
990 pci_default_write_config(pdev, PCI_PRIMARY_BUS,
991 pci_dev_bus_num(pdev), 1);
992 s->bus_no += 1;
993 pci_default_write_config(pdev, PCI_SECONDARY_BUS, s->bus_no, 1);
994
995 s390_pci_update_subordinate(pdev, s->bus_no);
996 }
997 } else if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
998 pdev = PCI_DEVICE(dev);
999
1000 if (!dev->id) {
1001 /* In the case the PCI device does not define an id */
1002 /* we generate one based on the PCI address */
1003 dev->id = g_strdup_printf("auto_%02x:%02x.%01x",
1004 pci_dev_bus_num(pdev),
1005 PCI_SLOT(pdev->devfn),
1006 PCI_FUNC(pdev->devfn));
1007 }
1008
1009 pbdev = s390_pci_find_dev_by_target(s, dev->id);
1010 if (!pbdev) {
1011 pbdev = s390_pci_device_new(s, dev->id, errp);
1012 if (!pbdev) {
1013 return;
1014 }
1015 }
1016
1017 pbdev->pdev = pdev;
1018 pbdev->iommu = s390_pci_get_iommu(s, pci_get_bus(pdev), pdev->devfn);
1019 pbdev->iommu->pbdev = pbdev;
1020 pbdev->state = ZPCI_FS_DISABLED;
1021 set_pbdev_info(pbdev);
1022
1023 if (object_dynamic_cast(OBJECT(dev), "vfio-pci")) {
1024 pbdev->fh |= FH_SHM_VFIO;
1025 pbdev->iommu->dma_limit = s390_pci_start_dma_count(s, pbdev);
1026 /* Fill in CLP information passed via the vfio region */
1027 s390_pci_get_clp_info(pbdev);
1028 } else {
1029 pbdev->fh |= FH_SHM_EMUL;
1030 }
1031
1032 if (s390_pci_msix_init(pbdev)) {
1033 error_setg(errp, "MSI-X support is mandatory "
1034 "in the S390 architecture");
1035 return;
1036 }
1037
1038 if (dev->hotplugged) {
1039 s390_pci_generate_plug_event(HP_EVENT_TO_CONFIGURED ,
1040 pbdev->fh, pbdev->fid);
1041 }
1042 } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
1043 pbdev = S390_PCI_DEVICE(dev);
1044
1045 /* the allocated idx is actually getting used */
1046 s->next_idx = (pbdev->idx + 1) & FH_MASK_INDEX;
1047 pbdev->fh = pbdev->idx;
1048 QTAILQ_INSERT_TAIL(&s->zpci_devs, pbdev, link);
1049 g_hash_table_insert(s->zpci_table, &pbdev->idx, pbdev);
1050 } else {
1051 g_assert_not_reached();
1052 }
1053 }
1054
1055 static void s390_pcihost_unplug(HotplugHandler *hotplug_dev, DeviceState *dev,
1056 Error **errp)
1057 {
1058 S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
1059 S390PCIBusDevice *pbdev = NULL;
1060
1061 if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
1062 PCIDevice *pci_dev = PCI_DEVICE(dev);
1063 PCIBus *bus;
1064 int32_t devfn;
1065
1066 pbdev = s390_pci_find_dev_by_pci(s, PCI_DEVICE(dev));
1067 g_assert(pbdev);
1068
1069 s390_pci_generate_plug_event(HP_EVENT_STANDBY_TO_RESERVED,
1070 pbdev->fh, pbdev->fid);
1071 bus = pci_get_bus(pci_dev);
1072 devfn = pci_dev->devfn;
1073 qdev_unrealize(dev);
1074
1075 s390_pci_msix_free(pbdev);
1076 s390_pci_iommu_free(s, bus, devfn);
1077 pbdev->pdev = NULL;
1078 pbdev->state = ZPCI_FS_RESERVED;
1079 } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
1080 pbdev = S390_PCI_DEVICE(dev);
1081 pbdev->fid = 0;
1082 QTAILQ_REMOVE(&s->zpci_devs, pbdev, link);
1083 g_hash_table_remove(s->zpci_table, &pbdev->idx);
1084 if (pbdev->iommu->dma_limit) {
1085 s390_pci_end_dma_count(s, pbdev->iommu->dma_limit);
1086 }
1087 qdev_unrealize(dev);
1088 }
1089 }
1090
1091 static void s390_pcihost_unplug_request(HotplugHandler *hotplug_dev,
1092 DeviceState *dev,
1093 Error **errp)
1094 {
1095 S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
1096 S390PCIBusDevice *pbdev;
1097
1098 if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_BRIDGE)) {
1099 error_setg(errp, "PCI bridge hot unplug currently not supported");
1100 } else if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
1101 /*
1102 * Redirect the unplug request to the zPCI device and remember that
1103 * we've checked the PCI device already (to prevent endless recursion).
1104 */
1105 pbdev = s390_pci_find_dev_by_pci(s, PCI_DEVICE(dev));
1106 g_assert(pbdev);
1107 pbdev->pci_unplug_request_processed = true;
1108 qdev_unplug(DEVICE(pbdev), errp);
1109 } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
1110 pbdev = S390_PCI_DEVICE(dev);
1111
1112 /*
1113 * If unplug was initially requested for the zPCI device, we
1114 * first have to redirect to the PCI device, which will in return
1115 * redirect back to us after performing its checks (if the request
1116 * is not blocked, e.g. because it's a PCI bridge).
1117 */
1118 if (pbdev->pdev && !pbdev->pci_unplug_request_processed) {
1119 qdev_unplug(DEVICE(pbdev->pdev), errp);
1120 return;
1121 }
1122 pbdev->pci_unplug_request_processed = false;
1123
1124 switch (pbdev->state) {
1125 case ZPCI_FS_STANDBY:
1126 case ZPCI_FS_RESERVED:
1127 s390_pci_perform_unplug(pbdev);
1128 break;
1129 default:
1130 /*
1131 * Allow to send multiple requests, e.g. if the guest crashed
1132 * before releasing the device, we would not be able to send
1133 * another request to the same VM (e.g. fresh OS).
1134 */
1135 pbdev->unplug_requested = true;
1136 s390_pci_generate_plug_event(HP_EVENT_DECONFIGURE_REQUEST,
1137 pbdev->fh, pbdev->fid);
1138 }
1139 } else {
1140 g_assert_not_reached();
1141 }
1142 }
1143
1144 static void s390_pci_enumerate_bridge(PCIBus *bus, PCIDevice *pdev,
1145 void *opaque)
1146 {
1147 S390pciState *s = opaque;
1148 PCIBus *sec_bus = NULL;
1149
1150 if ((pci_default_read_config(pdev, PCI_HEADER_TYPE, 1) !=
1151 PCI_HEADER_TYPE_BRIDGE)) {
1152 return;
1153 }
1154
1155 (s->bus_no)++;
1156 pci_default_write_config(pdev, PCI_PRIMARY_BUS, pci_dev_bus_num(pdev), 1);
1157 pci_default_write_config(pdev, PCI_SECONDARY_BUS, s->bus_no, 1);
1158 pci_default_write_config(pdev, PCI_SUBORDINATE_BUS, s->bus_no, 1);
1159
1160 sec_bus = pci_bridge_get_sec_bus(PCI_BRIDGE(pdev));
1161 if (!sec_bus) {
1162 return;
1163 }
1164
1165 /* Assign numbers to all child bridges. The last is the highest number. */
1166 pci_for_each_device(sec_bus, pci_bus_num(sec_bus),
1167 s390_pci_enumerate_bridge, s);
1168 pci_default_write_config(pdev, PCI_SUBORDINATE_BUS, s->bus_no, 1);
1169 }
1170
1171 static void s390_pcihost_reset(DeviceState *dev)
1172 {
1173 S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
1174 PCIBus *bus = s->parent_obj.bus;
1175 S390PCIBusDevice *pbdev, *next;
1176
1177 /* Process all pending unplug requests */
1178 QTAILQ_FOREACH_SAFE(pbdev, &s->zpci_devs, link, next) {
1179 if (pbdev->unplug_requested) {
1180 if (pbdev->summary_ind) {
1181 pci_dereg_irqs(pbdev);
1182 }
1183 if (pbdev->iommu->enabled) {
1184 pci_dereg_ioat(pbdev->iommu);
1185 }
1186 pbdev->state = ZPCI_FS_STANDBY;
1187 s390_pci_perform_unplug(pbdev);
1188 }
1189 }
1190
1191 /*
1192 * When resetting a PCI bridge, the assigned numbers are set to 0. So
1193 * on every system reset, we also have to reassign numbers.
1194 */
1195 s->bus_no = 0;
1196 pci_for_each_device(bus, pci_bus_num(bus), s390_pci_enumerate_bridge, s);
1197 }
1198
1199 static void s390_pcihost_class_init(ObjectClass *klass, void *data)
1200 {
1201 DeviceClass *dc = DEVICE_CLASS(klass);
1202 HotplugHandlerClass *hc = HOTPLUG_HANDLER_CLASS(klass);
1203
1204 dc->reset = s390_pcihost_reset;
1205 dc->realize = s390_pcihost_realize;
1206 dc->unrealize = s390_pcihost_unrealize;
1207 hc->pre_plug = s390_pcihost_pre_plug;
1208 hc->plug = s390_pcihost_plug;
1209 hc->unplug_request = s390_pcihost_unplug_request;
1210 hc->unplug = s390_pcihost_unplug;
1211 msi_nonbroken = true;
1212 }
1213
1214 static const TypeInfo s390_pcihost_info = {
1215 .name = TYPE_S390_PCI_HOST_BRIDGE,
1216 .parent = TYPE_PCI_HOST_BRIDGE,
1217 .instance_size = sizeof(S390pciState),
1218 .class_init = s390_pcihost_class_init,
1219 .interfaces = (InterfaceInfo[]) {
1220 { TYPE_HOTPLUG_HANDLER },
1221 { }
1222 }
1223 };
1224
1225 static const TypeInfo s390_pcibus_info = {
1226 .name = TYPE_S390_PCI_BUS,
1227 .parent = TYPE_BUS,
1228 .instance_size = sizeof(S390PCIBus),
1229 };
1230
1231 static uint16_t s390_pci_generate_uid(S390pciState *s)
1232 {
1233 uint16_t uid = 0;
1234
1235 do {
1236 uid++;
1237 if (!s390_pci_find_dev_by_uid(s, uid)) {
1238 return uid;
1239 }
1240 } while (uid < ZPCI_MAX_UID);
1241
1242 return UID_UNDEFINED;
1243 }
1244
1245 static uint32_t s390_pci_generate_fid(S390pciState *s, Error **errp)
1246 {
1247 uint32_t fid = 0;
1248
1249 do {
1250 if (!s390_pci_find_dev_by_fid(s, fid)) {
1251 return fid;
1252 }
1253 } while (fid++ != ZPCI_MAX_FID);
1254
1255 error_setg(errp, "no free fid could be found");
1256 return 0;
1257 }
1258
1259 static void s390_pci_device_realize(DeviceState *dev, Error **errp)
1260 {
1261 S390PCIBusDevice *zpci = S390_PCI_DEVICE(dev);
1262 S390pciState *s = s390_get_phb();
1263
1264 if (!zpci->target) {
1265 error_setg(errp, "target must be defined");
1266 return;
1267 }
1268
1269 if (s390_pci_find_dev_by_target(s, zpci->target)) {
1270 error_setg(errp, "target %s already has an associated zpci device",
1271 zpci->target);
1272 return;
1273 }
1274
1275 if (zpci->uid == UID_UNDEFINED) {
1276 zpci->uid = s390_pci_generate_uid(s);
1277 if (!zpci->uid) {
1278 error_setg(errp, "no free uid could be found");
1279 return;
1280 }
1281 } else if (s390_pci_find_dev_by_uid(s, zpci->uid)) {
1282 error_setg(errp, "uid %u already in use", zpci->uid);
1283 return;
1284 }
1285
1286 if (!zpci->fid_defined) {
1287 Error *local_error = NULL;
1288
1289 zpci->fid = s390_pci_generate_fid(s, &local_error);
1290 if (local_error) {
1291 error_propagate(errp, local_error);
1292 return;
1293 }
1294 } else if (s390_pci_find_dev_by_fid(s, zpci->fid)) {
1295 error_setg(errp, "fid %u already in use", zpci->fid);
1296 return;
1297 }
1298
1299 zpci->state = ZPCI_FS_RESERVED;
1300 zpci->fmb.format = ZPCI_FMB_FORMAT;
1301 }
1302
1303 static void s390_pci_device_reset(DeviceState *dev)
1304 {
1305 S390PCIBusDevice *pbdev = S390_PCI_DEVICE(dev);
1306
1307 switch (pbdev->state) {
1308 case ZPCI_FS_RESERVED:
1309 return;
1310 case ZPCI_FS_STANDBY:
1311 break;
1312 default:
1313 pbdev->fh &= ~FH_MASK_ENABLE;
1314 pbdev->state = ZPCI_FS_DISABLED;
1315 break;
1316 }
1317
1318 if (pbdev->summary_ind) {
1319 pci_dereg_irqs(pbdev);
1320 }
1321 if (pbdev->iommu->enabled) {
1322 pci_dereg_ioat(pbdev->iommu);
1323 }
1324
1325 fmb_timer_free(pbdev);
1326 }
1327
1328 static void s390_pci_get_fid(Object *obj, Visitor *v, const char *name,
1329 void *opaque, Error **errp)
1330 {
1331 Property *prop = opaque;
1332 uint32_t *ptr = object_field_prop_ptr(obj, prop);
1333
1334 visit_type_uint32(v, name, ptr, errp);
1335 }
1336
1337 static void s390_pci_set_fid(Object *obj, Visitor *v, const char *name,
1338 void *opaque, Error **errp)
1339 {
1340 S390PCIBusDevice *zpci = S390_PCI_DEVICE(obj);
1341 Property *prop = opaque;
1342 uint32_t *ptr = object_field_prop_ptr(obj, prop);
1343
1344 if (!visit_type_uint32(v, name, ptr, errp)) {
1345 return;
1346 }
1347 zpci->fid_defined = true;
1348 }
1349
1350 static const PropertyInfo s390_pci_fid_propinfo = {
1351 .name = "zpci_fid",
1352 .get = s390_pci_get_fid,
1353 .set = s390_pci_set_fid,
1354 };
1355
1356 #define DEFINE_PROP_S390_PCI_FID(_n, _s, _f) \
1357 DEFINE_PROP(_n, _s, _f, s390_pci_fid_propinfo, uint32_t)
1358
1359 static Property s390_pci_device_properties[] = {
1360 DEFINE_PROP_UINT16("uid", S390PCIBusDevice, uid, UID_UNDEFINED),
1361 DEFINE_PROP_S390_PCI_FID("fid", S390PCIBusDevice, fid),
1362 DEFINE_PROP_STRING("target", S390PCIBusDevice, target),
1363 DEFINE_PROP_END_OF_LIST(),
1364 };
1365
1366 static const VMStateDescription s390_pci_device_vmstate = {
1367 .name = TYPE_S390_PCI_DEVICE,
1368 /*
1369 * TODO: add state handling here, so migration works at least with
1370 * emulated pci devices on s390x
1371 */
1372 .unmigratable = 1,
1373 };
1374
1375 static void s390_pci_device_class_init(ObjectClass *klass, void *data)
1376 {
1377 DeviceClass *dc = DEVICE_CLASS(klass);
1378
1379 dc->desc = "zpci device";
1380 set_bit(DEVICE_CATEGORY_MISC, dc->categories);
1381 dc->reset = s390_pci_device_reset;
1382 dc->bus_type = TYPE_S390_PCI_BUS;
1383 dc->realize = s390_pci_device_realize;
1384 device_class_set_props(dc, s390_pci_device_properties);
1385 dc->vmsd = &s390_pci_device_vmstate;
1386 }
1387
1388 static const TypeInfo s390_pci_device_info = {
1389 .name = TYPE_S390_PCI_DEVICE,
1390 .parent = TYPE_DEVICE,
1391 .instance_size = sizeof(S390PCIBusDevice),
1392 .class_init = s390_pci_device_class_init,
1393 };
1394
1395 static TypeInfo s390_pci_iommu_info = {
1396 .name = TYPE_S390_PCI_IOMMU,
1397 .parent = TYPE_OBJECT,
1398 .instance_size = sizeof(S390PCIIOMMU),
1399 };
1400
1401 static void s390_iommu_memory_region_class_init(ObjectClass *klass, void *data)
1402 {
1403 IOMMUMemoryRegionClass *imrc = IOMMU_MEMORY_REGION_CLASS(klass);
1404
1405 imrc->translate = s390_translate_iommu;
1406 imrc->replay = s390_pci_iommu_replay;
1407 }
1408
1409 static const TypeInfo s390_iommu_memory_region_info = {
1410 .parent = TYPE_IOMMU_MEMORY_REGION,
1411 .name = TYPE_S390_IOMMU_MEMORY_REGION,
1412 .class_init = s390_iommu_memory_region_class_init,
1413 };
1414
1415 static void s390_pci_register_types(void)
1416 {
1417 type_register_static(&s390_pcihost_info);
1418 type_register_static(&s390_pcibus_info);
1419 type_register_static(&s390_pci_device_info);
1420 type_register_static(&s390_pci_iommu_info);
1421 type_register_static(&s390_iommu_memory_region_info);
1422 }
1423
1424 type_init(s390_pci_register_types)